Help Net Security
Video: How to win at the compliance and security game
Embedded below is Ron Gula’s talk “How to win at the compliance and security game” from January 8th’s DojoSec event. Ron Gula is the CTO of Tenable …
AirPcap Nx USB-based dual-band WLAN capture adapter
CACE Technologies released AirPcap Nx, a USB-based WLAN capture adapter with support for 802.11a/b/g/n, packet injection, multi-channel aggregation, multiple external antennas …
Discover announces PCI data security merchant levels
Discover Financial Services announced it is rolling out an enhancement to its Discover Information Security and Compliance (DISC) program that will streamline the validation …
SanDisk Cruzer USB drive listed for Common Criteria Certification
SanDisk has been selected for evaluation of its Cruzer Enterprise FIPS edition secure USB flash drive for Common Criteria EAL2 certification under the data protection schedule …
New version of The Dude network monitoring application
The Dude network monitor is an application by MikroTik which can dramatically improve the way you manage your network environment. It will automatically scan all devices …
Cisco CCNA Security video training
Professional computer training company Train Signal announced the release of the latest in the Cisco CCNA video training series, Cisco CCNA Security. This advanced topic …
New phishing attack that infiltrates secure website sessions
Trusteer has identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on to an online banking, …
Accelerating wireless network security audits
ElcomSoft announced the availability of GPU-accelerated version of Elcomsoft Wireless Security Auditor 1.0, a product to audit wireless network security by attempting to …
USB encryption drive defense against autorun malware attacks with Hydra PC
SPYRUS announced the Hydra Privacy Card (Hydra PC) family of USB encrypting devices is immune from USB autorun malware attacks. Hydra PC, which utilizes the most advanced …
Details on the Downadup worm that is causing new outbreaks
Win32.Worm.Downadup worm made its first appearance late November 2008, exploiting the MS08-067 vulnerability to spread unhindered in local area networks. Its purpose was to …
Video: Barbara Hershey, Blogspot and fake anti-virus software
In the video below, Paul Baccas of SophosLabs explores how fake anti-virus software designed to scare the unwary out of money is being planted into Google Search results …
Gartner survey shows IT spending to be flat in 2009
As enterprises face a challenging economic environment, IT spending budgets will be essentially flat with a planned increase of 0.16 percent in 2009, according to results from …
Featured news
Resources
Don't miss
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam